This script is used for extracting DDE in docx and xlsx
☆12Dec 8, 2017Updated 8 years ago
Alternatives and similar repositories for DDE-Extractor
Users that are interested in DDE-Extractor are comparing it to the libraries listed below
Sorting:
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- ☆24Mar 3, 2020Updated 5 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- ☆12Nov 9, 2017Updated 8 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Execute DLL via the Excel.Application object's RegisterXLL() method☆22Apr 17, 2021Updated 4 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- Specifications used in the MISP project including MISP core format☆53Jan 7, 2026Updated last month
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- Basic demo for Hidden Treasure talk.☆49Nov 4, 2017Updated 8 years ago
- Dexaran's Naming Service☆20Mar 22, 2023Updated 2 years ago
- Rex library for dealing with Powershell Scripts☆53Aug 4, 2025Updated 6 months ago
- ☆19Nov 26, 2020Updated 5 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 6 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- PowerDNS: Powershell DNS Delivery☆216Sep 26, 2018Updated 7 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- FIX (Financial Information eXchange) protocol fuzzer☆24Jul 22, 2022Updated 3 years ago
- ☆54Feb 27, 2017Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- This repo is all about myself coded exploit codes :)☆55Aug 27, 2019Updated 6 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- Miscellanous scripts used for malware analysis☆23Oct 4, 2018Updated 7 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago